[Openswan Users] rekey problem between openswan and strongswan

Patrick Naubert patrickn at xelerance.com
Fri Jan 30 09:21:57 EST 2015


Rescued from the Spam bucket.  Please remember to subscribe to the mailing list before posting to it.

From: "Ko, HsuenJu" <HsuenJu.Ko at stratus.com <mailto:HsuenJu.Ko at stratus.com>>
To: "'users at lists.openswan.org <mailto:users at lists.openswan.org>'" <users at lists.openswan.org <mailto:users at lists.openswan.org>>
Subject: rekey problem between openswan and strongswan
Date: January 30, 2015 at 9:04:14 AM GMT-5


Hi,
I experienced problem between strongswan and openswan involving rekey.  Strongswan side sent CREATE_CHILD_SA message and openswan side does not respond and here is the log from openswan side.  I found a thread from Oct, 2010 dev list with similar issue shown below.   I am using openswan 2.6.32.  Is it possible this is fixed in later release?
 
| *received 316 bytes from 134.111.75.175:500 on bond0 (port=500)
|   c0 69 8d 71  51 69 ae 11  84 f0 91 c5  c6 de 29 da
|   2e 20 24 00  00 00 00 00  00 00 01 3c  29 00 01 20
|   a4 8e 59 4b  86 a6 17 ce  ff 0e 5d 11  c5 88 b0 03
|   ec 2b c6 e7  a3 ba 07 12  6f 78 de f7  e9 92 d6 b0
|   22 26 99 fb  4f bb a7 25  9c bd 7c 9b  b2 ff e2 88
|   3f bf bd 88  ab 07 1d 4a  c8 58 45 42  ba 3a 56 7a
|   b3 74 19 9a  c2 73 c7 fb  b4 2e 9c 00  5c 68 41 bb
|   0b 71 ba e7  4d f6 aa 02  f4 bc b7 54  e3 bb 50 44
|   1f c0 a5 06  d2 bc aa d9  c7 91 5b 5a  0b ae 87 26
|   e7 d9 bc 64  da 66 c4 7e  a4 34 e2 a1  f7 ca a0 44
|   fb 7c 4a de  95 98 82 81  77 cf 3d 05  e3 c0 f9 30
|   eb be 0a 26  e7 91 01 d7  af fe d0 16  1e 39 40 0e
|   8d 7b a5 2d  0c c4 54 75  36 c7 98 3e  59 89 e2 e8
|   0d 50 28 30  ec e3 97 38  cd 3e 58 f3  af 21 90 86
|   18 2d 45 95  b8 31 3f b1  44 69 b9 98  0f 0f 7b dc
|   ea ae ec 50  d1 c9 bd d1  51 a9 ed aa  01 e1 93 04
|   a8 47 6f 20  4a 3a 79 c9  6f f1 cf 00  a1 59 a5 aa
|   78 ff e2 c6  09 e9 dd 54  2c 57 6b a4  61 39 92 cb
|   bb 7f 9b 21  12 95 df a6  1b 5a 62 76  54 f6 69 c8
|   e4 96 c1 1d  d1 25 02 9a  35 2f 66 79
| **parse ISAKMP Message:
|    initiator cookie:
|   c0 69 8d 71  51 69 ae 11
|    responder cookie:
|   84 f0 91 c5  c6 de 29 da
|    next payload type: ISAKMP_NEXT_v2E
|    ISAKMP version: IKEv2 version 2.0 (rfc4306)
|    exchange type: ISAKMP_v2_CHILD_SA
|    flags: none
|    message ID:  00 00 00 00
|    length: 316
|  processing version=2.0 packet with exchange type=ISAKMP_v2_CHILD_SA (36)
| I am IKE SA Initiator
| ICOOKIE:  c0 69 8d 71  51 69 ae 11
| RCOOKIE:  84 f0 91 c5  c6 de 29 da
| state hash entry 1
| v2 peer and cookies match on #1
| v2 state object #1 found, in STATE_PARENT_I3
| * processed 0 messages from cryptographic helpers
| next event EVENT_PENDING_DDNS in 47 seconds
| next event EVENT_PENDING_DDNS in 47 seconds
 
 
On Wed, 27 Oct 2010, Yatong Cui wrote:
 
> 1>First sorry that i forgot to change the phase 1 settings on the strongswan side from a previous test,should be "ike=3des-sha1-modp1024(not aes)", however the result is the same,the rekey is still not successful.
 
I am not sure if the "rekey" is the issue. It seems like this is the initial child_sa?
 
> (SCENARION D)======STRONGSWAN----->>-----OPENSWAN=========
>                   (shorter)             (longer)
> 
> After 'lifetime minus margintime(parameters on strongswan)',strongswan begins to send the 'CREATE_CHILD_SA' isakmp packets.
> 
> But there seems to be no respond from openswan side.
 
The relevant part of the log being:
 
Oct 27 07:36:44 OPENSWAN pluto[4474]: | **parse ISAKMP Message:
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    initiator cookie:
Oct 27 07:36:44 OPENSWAN pluto[4474]: |   ed 1f 17 d9  81 8f 37 92
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    responder cookie:
Oct 27 07:36:44 OPENSWAN pluto[4474]: |   16 d1 0c 4a  ac 5e c6 65
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    next payload type: ISAKMP_NEXT_v2E
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    ISAKMP version: IKEv2 version 2.0 (rfc4306)
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    exchange type: ISAKMP_v2_CHILD_SA
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    flags: ISAKMP_FLAG_INIT
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    message ID:  00 00 00 02
Oct 27 07:36:44 OPENSWAN pluto[4474]: |    length: 348
Oct 27 07:36:44 OPENSWAN pluto[4474]: |  processing version=2.0 packet with exchange type=ISAKMP_v2_CHILD_SA (36)
Oct 27 07:36:44 OPENSWAN pluto[4474]: | ICOOKIE:  ed 1f 17 d9  81 8f 37 92
Oct 27 07:36:44 OPENSWAN pluto[4474]: | RCOOKIE:  16 d1 0c 4a  ac 5e c6 65
Oct 27 07:36:44 OPENSWAN pluto[4474]: | state hash entry 23
Oct 27 07:36:44 OPENSWAN pluto[4474]: | v2 peer and cookies match on #1
Oct 27 07:36:44 OPENSWAN pluto[4474]: | v2 state object #1 found, in STATE_PARENT_R2
Oct 27 07:36:44 OPENSWAN pluto[4474]: packet from 2001:db8:1:2:20c:29ff:fe45:b04e:500: sending notification v2N_INVALID_MESSAGE_ID to 2001:db8:1:2:20c:29ff:fe45:b04e:500
Oct 27 07:36:44 OPENSWAN pluto[4474]: | don't send packet when notification data empty
Oct 27 07:36:44 OPENSWAN pluto[4474]: | * processed 0 messages from cryptographic helpers
Oct 27 07:36:44 OPENSWAN pluto[4474]: | next event EVENT_PENDING_DDNS in 31 seconds
Oct 27 07:36:44 OPENSWAN pluto[4474]: | next event EVENT_PENDING_DDNS in 31 seconds
Oct 27 07:36:50 OPENSWAN pluto[4474]: |
 
Can you check the RFC to see if the COOKIES of the parent_sa should be used for the child_sa?
 
Without having looked at the code, it seems we think these cookies belong to a parent_sa, and we
are not expecting a ISAKMP_v2_CHILD_SA packet with those cookies?
 
Paul
_______________________________________________

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20150130/3e5f457c/attachment-0001.html>


More information about the Users mailing list